CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

University

10 Qs

quiz-placeholder

Similar activities

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

ระบบปฏิบัติการ ชุดที่ 1

ระบบปฏิบัติการ ชุดที่ 1

University

15 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

Internet

Internet

University

11 Qs

ICF-Mechanical-(Theory Quiz-2)

ICF-Mechanical-(Theory Quiz-2)

University

10 Qs

Computer Network

Computer Network

University

10 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

farizatul akmar

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 3 pts

Which of the following are the THREE (3) importance of computer and network security?

To protect company assets

To keep your accessibility

To gain a competitive advantage

To keep you job

2.

FILL IN THE BLANK QUESTION

1 min • 3 pts

The three legs of the "security trinity" are:

1. ________

2. ________

3. ________

3.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the FOUR (4) core principles of Information Security?

Integrity

Prevention

Confidentiality

Availability

Authentication

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The following are the risks assessment process of evaluating potential risks EXCEPT ...

Identifying and prioritizing assets

Identifying threats and their probabilities

Developing a cost benefit analysis

Identifying accessibility

Identifying countermeasure

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

____________ is an effort to obtain illegal admission to your organization’s network, to take your data without your knowledge, or execute other malicious pursuits

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

________ refers to malicious hackers gain unauthorized access to a computer system or network. They also make amendments to the data, either by encrypting, removing, or compromising it.

7.

MULTIPLE SELECT QUESTION

45 sec • 4 pts

What are the FOUR (4) major categories of Network Security Threats?

Structured Threats

Cumulative Threats

Externals Threats

Internal Threats

Unstructured Threats

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?